Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Borel Nobi

Summary

Motivated and experienced SOC Analyst with at least 3 years of experience in cybersecurity operations, threat detection, and incident response. Skilled in analyzing security incidents, utilizing security tools, and devising successful security protocols. Committed to improving organizational security by taking a proactive approach to monitoring and managing incidents. Digital leader, competent with policy and effective communication.

Overview

3
3
years of professional experience
1
1
Certification

Work History

SOC ANALYST

Maximus
09.2021 - Current
  • Monitored security alerts and logs from SIEM tools to identify potential threats and vulnerabilities
  • Conducted incident response for security breaches, coordinating with IT and forensic teams to minimize impact to company
  • Developed and implemented security protocols to improve overall network security and compliance
  • Participated in threat hunting activities and vulnerability assessments, leading to 60% reduction in security incidents
  • Created comprehensive reports for management outlining incidents, trends, and security improvements
  • Conducts tuning changes to SIEM queries that reduce alert frequency of specific queries between 51% and 99%, which optimizes process/procedure aspects of incident lifecycle by reducing false positives encountered during monitoring/detection phase
  • Incident Triage Analysts create filters, data monitors, dashboards, and reports within monitoring utilities
  • Worked on cases based on alerts varying from phishing cases to host-based cases
  • Performed incident response, with primary focus of eliminating threat to network and determining cause of security
  • Optimized network and host-based firewall administration, including rule modification, troubleshooting, and vendor support
  • Improved VPN performance and decreased downtime
  • Created detailed documentation to help employees utilize security tools efficiently
  • By simplifying complicated technical ideas into easy-to-follow manuals.
  • Conducted security audits to identify vulnerabilities.
  • Performed risk analyses to identify appropriate security countermeasures.

Junior SOC Analyst

Bailiwick
07.2021 - 09.2021
  • Collaborated with IT teams to improve cybersecurity measures, leading to 40% decrease in cyber-related operational risks and protection of sensitive data
  • Responded to security incidents by performing initial triage and escalation procedures
  • Collaborated with senior analysts on threat intelligence and malware analysis
  • Maintained and updated documentation related to incident responses and security policies
  • Provided support in security awareness training for employees, increasing overall cybersecurity awareness
  • Assisted in creating Splunk dashboards to capture all customized logs generated by systems and applications
  • Regular training sessions were held for operational teams on risk awareness and mitigation strategies, leading to 15% reduction in human error-related incidents
  • Formulated precise instructions aligned with Project Management Business Process (PMBP) and ISO standards
  • This contributed to 30% improvement in project execution efficiency and compliance
  • Perform additional analysis of escalations from Event Detection analysts and reviews Level 1 tickets
  • Event Analyst, CSIRT (Cyber Security Incident Response Team) Is responsible for detecting and assessing cyber security events and incidents across Target environment
  • Worked closely with detection rules made by Threat Intelligence Detection Engineering Team (TIDE).
  • Conducted security audits to identify vulnerabilities.
  • Performed risk analyses to identify appropriate security countermeasures.

Education

BSc in information systems - Computer And Information Systems Security

St Cloud State
Minnesota
05.2021

Skills

  • Windows, macOS, Red Hat Enterprise Linux
  • Strong Analytical skills
  • Python, Bash, PowerShell, C#
  • SIEM (Splunk, ELK,), Firewalls (Cisco)
  • TCP/IP, DNS, HTTP/S, VPN
  • Intrusion Detection
  • Vulnerability Assessment
  • Scripting Languages
  • Security analysis

Certification

  • Azure Fundamental
  • O365 Fundamentals
  • AWS Solution Architect
  • Splunk
  • CrowdStrike training
  • CompTIA Security+
  • Certified Ethical Hacker (CEH)
  • Certified Incident Handler (GCIH)
  • Microsoft certified Azure security
  • CyberArk
  • CompTIA Networking plus

Timeline

SOC ANALYST

Maximus
09.2021 - Current

Junior SOC Analyst

Bailiwick
07.2021 - 09.2021

BSc in information systems - Computer And Information Systems Security

St Cloud State
Borel Nobi